Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.

Patents

  1. Advanced Patent Search
Publication numberUS20090165089 A1
Publication typeApplication
Application numberUS 11/960,862
Publication dateJun 25, 2009
Filing dateDec 20, 2007
Priority dateDec 20, 2007
Also published asUS8838803
Publication number11960862, 960862, US 2009/0165089 A1, US 2009/165089 A1, US 20090165089 A1, US 20090165089A1, US 2009165089 A1, US 2009165089A1, US-A1-20090165089, US-A1-2009165089, US2009/0165089A1, US2009/165089A1, US20090165089 A1, US20090165089A1, US2009165089 A1, US2009165089A1
InventorsRichard Bennett
Original AssigneeRichard Bennett
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Methods and Apparatus for Management of User Presence in Communication Activities
US 20090165089 A1
Abstract
Systems and techniques for mediating user communications. A user persona manager maintains one or more user profiles and manages user interactions with other parties and with service providers based on user preferences associated with the user profile or profiles selected for a particular interaction. The persona manager receives a single set of user authentication information to establish the user identity, and provides previously stored information to other parties and service providers as appropriate, and otherwise conducts user interactions involving communications initiated by or on behalf of the user. The persona manager also examines interactions initiated by others, selects user profiles appropriate to the interactions, and routes and responds to the interactions based on information stored in the user profiles.
Images(3)
Previous page
Next page
Claims(20)
1. A communication system, comprising:
a communication exchange for receiving communications from a user directed to other parties and service providers and receiving communications to be directed to the user from the other parties and service providers; and
a persona manager for monitoring user interactions conducted over one or more electronic communication systems and automatically mediating communications between the user and the other parties and service providers carried on over the one or more electronic communication systems, the persona manager being operative to manage communications according to predetermined user preferences, managing communications including selecting user profiles and applying preferences appropriate to the nature and context of the communications.
2. The system of claim 1, wherein the persona manager automatically supplies user information appropriate to communications initiated by the user.
3. The system of claim 2, wherein the user information automatically supplied by the persona manager includes authentication information identifying the user to another party to the communication.
4. The system of claim 3, wherein the persona manager receives a single set of user authentication information identifying the user and establishing a trust relationship between the persona manager and the user.
5. The system of claim 3, wherein the persona manager monitors the user's public presence on one or more service providers with which the user engages and responds to interactions affecting the user according to user preferences.
6. The system of claim 5, wherein the persona manager selects a user profile for use with each of the one or more service providers with which the user engages and responds to interactions affecting the user according to the user preferences in that profile.
7. The system of claim 6, wherein the persona manager maintains user information and releases information to other parties according to user preferences associated with user profiles selected for interactions involving the other parties.
8. The system of claim 7, wherein the preferences include categories of information and categories of persons authorized to receive information in each of the specified categories, and wherein the persona manager authenticates parties as authorized to receive information based on their inclusion in specified categories.
9. The system of claim 8, wherein the persona manager releases information related to different user identities presented by the user depending on the category of a party to whom the information is to be released.
10. The system of claim 9, wherein the different user identities include identities using genuine or pseudonymous information depending on the classification of the party to whom the information is to be released.
11. The system of claim 8, wherein authentication of a party as authorized to receive information includes receiving authentication information identifying the party with a particular organization.
12. The system of claim 6, wherein the persona manager selects a user profile based on conditions relating to the context in which the interaction occurs.
13. The system of claim 12, wherein the conditions relating to the context in which the interaction occurs include one or more of time of day, parties to the interaction, location of the originator at the time of the interaction, services used in the interaction, and nature of the activities being undertaken in the interaction.
14. A method of managing user communications, comprising the steps of:
selecting a user profile based on the nature and context of an interaction between a user and another party or a service provider carried on over one or more electronic communication systems; and
managing the interaction so as to present a public presence for the user based on preferences associated with the user profile.
15. The method of claim 14, wherein the step of managing the interaction includes presenting previously stored user information appropriate to the interaction.
16. The method of claim 14, wherein managing the user communication includes receiving a single set of authentication information identifying the user and presenting previously stored authentication information required by service providers with which the user is interacting.
17. The method of claim 16 wherein managing the user communication includes authenticating other parties engaging in an interaction affecting the user and releasing selected user information to other parties authorized to receive the information by a user profile associated with the interaction.
18. The method of claim 17, wherein releasing the selected user information includes choosing genuine or pseudonymous contact information depending on the identity of the other parties.
19. The method of claim 17, wherein managing the user interaction includes selecting a user profile based on the nature and content of a communication initiated by another party and routing the communication based on user preferences associated with the user profile.
20. The method of claim 14, wherein managing the public presence of the user comprises managing Internet communications and activities relating to the user according to the user preferences.
Description
FIELD OF THE INVENTION

The present invention relates generally to improvements to communications and user interfaces with communication systems. More particularly, the invention relates to improved systems and techniques for managing the presence presented by a user in different communication contexts.

BACKGROUND OF THE INVENTION

Communication is of great and increasing importance in modern life. Many people spend much of their lives in communication with others in numerous different contexts, such as personal and work email, instant messaging, voice communication, text messaging, online shopping, online auctions, and innumerable other different varieties of communication. Users present many different personas in these contexts, for example, presenting different patterns of behavior and sharing different types of information. In their activities in different personas, users may employ the same or some of the same communication methods, such as instant messaging, email, or other methods, with the user presenting his or her persona based on the identities of the persons and groups with whom he or she is interacting and the activities being conducted, rather than the mechanics by which communication is conducted.

Many users engage in myriad different types of activities, with each type of activity being associated with numerous elements of information relating to the user. For example, a member of a professional organization may have identifiers, such as a registration number identifying himself or herself as a member of the organization, and a user id and password used to log in to a website maintained by the organization. The user may also be willing to share information with members of the organization that he or she may not be willing to share with other persons, such as unidentified email correspondents.

In addition, many people employ numerous different elements of information to identify themselves in their various activities, maintaining, for example, numerous different sets of user ids and passwords. In addition, persons may engage in sets of activities associated with a particular persona, such as actions taken by a player's character in an online game, or bidding habits in online auctions. As the number of activities in which users are engaged continues to increase, the burden of managing the information identifying and enabling these activities continues to increase.

SUMMARY OF THE INVENTION

Among its several aspects, the present invention addresses such issues, as well as others, by presenting a user with a mechanism for managing his or her different personas, and the various public presences that are presented by following the preferences in the different persona. The public presence of a user may include, for example, different identities that are presented in various public venues. For example, a user may wish to present his or her true identity in venues such as his or her work or financial activities, but may wish to present a pseudonymous activity in other venues, such as public forums. In addition, the public presence that a user wishes to present may influence the behavior that may be engaged in by the user. For example, one persona may include preferences directed toward cautious or aggressive tendencies in venues such as online auctions, so that a persona can present a public presence of a user that automatically behaves in certain ways based on the preferences expressed in that persona. Still another aspect of the user's public presence can relate to sharing of information and what sort of information is shared, and with whom.

A user presents a single authenticator to a persona manager, which mediates between the user and the various mechanisms he or she uses to engage in his or her various online activities. The persona manager suitably stores identifiers, permissions, behavior preferences, and other selections established by the user. The user is able to use the persona manager to invoke various activities, and the persona manager automates various aspects of the activities, implementing user actions and providing authorized information according to the particular activity being engaged in and the particular persona being presented.

The persona manager can also manage incoming communications, for example, managing responses to requests for instant messaging sessions, emails, requests for information, and other incoming communications. The persona manager can examine an incoming communication, identifying the source of the communication and associating the communication with a particular persona presented by the user, and deal with the communication appropriately. A communication from an unknown sender may be given a low priority, and a communication from a specifically rejected user may be blocked. A communication from a colleague may be given a high priority, or may be treated in specified ways, such as routing it to a user's work email address, or alerting the user through an instant message or voicemail. Numerous additional mechanisms for managing incoming communications may be employed, as specified by the user or determined by rules set up by the user.

A more complete understanding of the present invention, as well as further features and advantages of the invention, will be apparent from the following Detailed Description and the accompanying drawings.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 illustrates a communication system according to an aspect of the present invention; and

FIG. 2 illustrates a process of communication management according to an aspect of the present invention.

DETAILED DESCRIPTION

FIG. 1 illustrates a communication system 100 according to an aspect of the present invention. The system 100 includes a central exchange 102, coordinating the activities of a wireless telephone network 106, a landline telephone system 108, and a wireless data network 110. The wireless data network 110 and the wireless telephone network 106 are illustrated separately here, but it will be recognized that a wireless telephone network may provide comprehensive data capabilities. It will be recognized that numerous networks may provide access to the public Internet 111 with the wireless telephone network 106 and the wireless data network 110 illustrated here as providing such access.

The central exchange 102 directs communication traffic to customers. Traffic may originate in any of the various networks and systems 106, 108, and 110, but a communication may be redirected to a different network from that in which the communication originated. For example, a text message directed to a user's email may be redirected to the user's cellular telephone, or a telephone message may be redirected to a user's instant messaging client.

A user communicates with the system 100 using a number of devices, including a cellular telephone 112, a landline telephone 114, and a computer 116. The cellular telephone 112 suitably provides data capabilities and is capable of communicating over the cellular telephone network 106 and the wireless data network 110. The user is able to employ each of these devices to interact with numerous different persons and organizations in numerous different ways.

The central exchange 102 suitably includes a server 118, including a processor 120, memory 122, and storage 124, communicating over a bus 126. The exchange 102 also includes an interface and routing system 128, for receiving and routing communications received over the various networks 106, 108, and 110. The interface and routing system delivers information relating to various communications to the server 118, which then supplies information used in directing, forwarding, responding to, or otherwise managing the communications.

The server 118 implements a persona manager 130, which may suitably be implemented as software hosted in storage 124 and transferred to memory 122 for execution as needed by the processor 120. The persona manager 130 has access to a user information database 132, hosting a plurality of user records that may suitably include user preferences, rules, and information, for each user of the system. For simplicity, the operation of the persona manager 130 will be described with respect to a single user, but it will be recognized that the persona manager will typically provide services to a large number of users and managing a large number of communications.

The persona manager 130 presents an interface to the user, allowing the user to present a single set of authenticators that will establish a first relationship between the persona manager 130 and the user, authorizing the persona manager to authenticate the user to all the different services that the user employs through the persona manager. Authentication may be accomplished, for example, by submitting a username and password using the computer 116 or the telephone 112, or may simply be accomplished through authentication information provided by the devices, such as an electronic serial number supplied by the cellular telephone, or an authentication key submitted by the computer 116. If desired, the persona manager 130 may be configured so as to require the user to submit additional authentication information for various classes of activities, such as a banking authenticator allowing access to the various banking activities conducted by the user, such as credit card, deposit account, and brokerage services. Once a user has provided the required authentication to the persona manager 130, the persona manager 130 can automatically supply authentication information to the various services to which the user may request access. This information might include the banking information mentioned above, entertainment subscription information, online shopping information, and whatever additional information is needed to obtain access to the services. The persona manager 130 is suitably able to sense the “presence” of a user. One example of such sensing might be recognizing the fact that a user's cellular 112 telephone is turned on, or that the user is engaged in a conversation using the cellular telephone. Another example might be the fact that the user's instant message client is active and the user is logged on, as well as whether the user is accessing the client from his or her computer or from a mobile device. Still another example might be the presence of a user's Bluetooth device in proximity to a particular Bluetooth server, with this information indicating the user's physical location.

In addition, the persona manager 130 may suitably examine the user's activities and communications on the public Internet, for example, shopping activities. All of this information can be used to detect the user's various private presences and to manage his or her public presences appropriately.

Suitably, the persona manager 130 has access to a number of user profiles, suitably stored in a user record 134 in the database 132. The profiles may include, for example, an online shopping and auction profile 136A, an online banking profile 136B, a work profile 136C, a student profile 136D, or any other profile that the user may wish to create, or that may be automatically established for the user. A user may specifically select a profile to be used. For example, before beginning a particular activity, such as an instant message session, the user may specify that the profile to be used is the student profile 136D. Alternatively, the persona manager 130 may suitably select the profile according to rules, taking into account information such as time of day, such as during the workday or on the weekend, location from which the user is initiating a communication, such as home, work, or school, service being invoked, such as banking services, online auction, professional association website, or person with whom communication is being initiated, such as a work colleague, a fellow student, a fellow member of a professional association, an unknown person, or a person whom the user specifically desires to avoid.

The user record 134 suitably includes a user information repository 138. The user information repository 138 suitably includes various elements of information that the user may desire to employ or to share, such as usernames and passwords for online services. The information repository 138 also includes information that may be shared with others, such as contact information that the user employs in various capacities. These may include work or student emails and telephone numbers, credit card billing addresses such as may be used in online shopping, frequent flyer numbers, and other information. The persona manager 130 controls the sharing of various aspects of these elements of information depending on user specifications and preferences.

The user may suitably supply information for storage in the information repository 138 on an ongoing basis, and information may suitably be extracted from user inputs during user activities for storage. For example, the persona manager 130 may monitor user communications, and may extract and store useful information entered by or supplied to the user during those communications. For example, when a user signs up for an airline frequent flyer program, the frequent flyer number may be recognized by the persona manager 130 and stored.

The persona manager 130 may suitably be active at all times, both responding to communications involving the user, whether initiated by the user or by a party contacting the user, and monitoring other activities affecting the user's public presence. A user may present a public presence in numerous different ways, such as maintaining a Myspace page or posting a Youtube video, as well as posting on forums, such as public interest and professional forums. Each of these public presences may elicit responses that may be of interest to the user, and the persona manager 130 may monitor the various public presences of the user to determine if responses or other communications have been presented in response to the user's activities. The persona manager 130 may present automated responses in appropriate cases, and may present appropriate alerts to the user when appropriate response or other events occur that may be of interest to the user.

In the case of a user initiated communication, the user presents an authentication to the persona manager 130. The persona manager 130 may be invoked whenever the user initiates a communication session, and the persona manager 130 examines authentication information presented in the communication session. In addition, the user may specifically invoke the persona manager 130, for example, through the computer 116, in order to add information to the repository 138, to establish, modify or delete user profiles, to add or change user preferences, which may suitably be recorded in a user preferences file, or to take such other actions as may be desired. For example, the user may add new email addresses as contacts, or may indicate that he or she has joined an organization and that the members of that organization are to have access to designated contact information for the user. The user may also employ a wireless device such as the telephone 112 for such purposes. Various rules and procedures may also be learned from the user's activities, such as accepting or blocking email, accepting or rejecting incoming telephone calls, and initiating telephone calls and contacts.

When the persona manager 130 is invoked in the course of a communication with another party that has been initiated by the user, the persona manger 130 examines the circumstances and context of the communication and takes action as needed. Suitably, the persona manager 130 selects a user profile from the user record 134 and examines the profile to determine the user preferences that are to be applied to the communication session. For example, if the user has initiated an instant message session with a student, the persona manager 130 may invoke an instant message service employing the instant messaging username that the user employs in communication with other students. Similarly, if a user is on a business trip, the persona manager 130 may invoke the user's work profile and may, for example, employ the user's work email address as the originating address for emails during the day and his or her home email address as the originating address during the evening and on weekends. The persona manager 130 may also supply information appropriate to a communication activity and the user profile appropriate to the activity. For example, the persona manage 130 may employ the banking profile 136B, and supply username and password information to an online banking site or may employ the shopping and auction profile 136E and use the preferences specified therein to automatically control user activities for online shopping, such as surveying auctions in which the user is participating and conducting bidding activity according to user preferences.

The persona manager 130 also manages incoming contacts with the user, examining the context of the contact and selecting the appropriate user profile and handling the contact according to the preferences specified in the profile. For example, an incoming instant messaging invitation will be examined to determine if the originator is known. An appropriate profile may be selected in view of the identity of the originator and in light of other circumstances surrounding the invitation. For example, if the user is at his or her work location, invitations from social friends may be rejected during work hours, with an appropriate message being returned to the originators. Telephone, email, and other contacts may be similarly managed. The persona manager 130 may also respond to information requests without necessarily requiring intervention by the user, For example, a fellow member of a common interest organization, such as antique collectors, may solicit an indication of interest in various items that the member has for sale. The persona manager 130 suitably identifies the originator of the message, invokes the online shopping and auction profile 136E, and generates a positive response with a request for additional information. The persona manager 130 also suitably passes the original message to an appropriate destination for the user, such as an email address, but does not need to wait for the user to notice and respond to the query in order to generate a request for information that may be of interest to the user. Other contacts, such as online advertisements, may be suppressed, allowed, or automatically responded to based on the identity of the sender and other information, such as the nature and content of the contact, as well as the context in which they are received, with the response being based on preferences expressed in the appropriate user profile.

FIG. 2 illustrates the steps of a method 200 of communication according to an aspect of the present invention. At step 202, instructions are received from a user and employed to establish a set of profiles and preferences for managing communication activities. The set of profiles and preferences may include default profiles that can be modified as desired by the user, and may include profiles newly created by the user.

At step 204, user information associated with the user's communication activities is collected and stored, such as contact information, identification information for various services, such as usernames and passwords, and additional information to be employed by or for the user or shared with others as appropriate. At step 206, upon initiation of a communication by a user, a persona manager is invoked and information identifying and authenticating the user is examined. At step 208, upon verification of user authentication information by the profile manager, an appropriate user profile is selected, for example, by specific selection by the user, or automatically through examination of the nature and context of the communication. At step 210, during the user's communication activities, information is supplied and actions taken as appropriate to the user preferences specified in the selected user profile.

At step 212, upon initiation of a contact with a user from another party, the persona manager is invoked and the contact is examined to identify the user being contacted and to determine characteristics such as the identity of the originator, the nature and content of the contact, and the context in which the contact is being made. At step 214, the information surrounding the contact is used to identify an appropriate user profile to be associated with the contact. At step 216, the contact is handled according to user preferences associated with the user profile.

While the present invention is disclosed in the context of a presently preferred embodiment, it will be recognized that a wide variety of implementations may be employed by persons of ordinary skill in the art consistent with the above discussion and the claims which follow below.

Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US7287270 *Oct 30, 2001Oct 23, 2007Arkray, Inc.User authentication method in network
US7383570 *Apr 25, 2003Jun 3, 2008Intertrust Technologies, Corp.Secure authentication systems and methods
US7673327 *Jun 27, 2007Mar 2, 2010Confluence Commons, Inc.Aggregation system
US7840808 *Oct 24, 2006Nov 23, 2010Kabushiki Kaisha ToshibaAuthentication system, device, and program
US7840813 *Nov 14, 2003Nov 23, 2010France TelecomMethod and system with authentication, revocable anonymity and non-repudiation
US7853535 *Jul 17, 2008Dec 14, 2010Colella Brian ASystem for secure internet access for children
US7861077 *Oct 6, 2006Dec 28, 2010Multiple Shift Key, Inc.Secure authentication and transaction system and method
US7949609 *Dec 27, 2006May 24, 2011Brian ColellaSystem for secure online selling, buying and bill pay in an electronic commerce setting
US8151364 *Oct 6, 2006Apr 3, 2012Emue Holdings Pty LtdAuthentication device and/or method
US8538011 *Aug 29, 2006Sep 17, 2013Blue Spike, Inc.Systems, methods and devices for trusted transactions
US20020029185 *Jun 5, 2001Mar 7, 2002Teruo TanakaMethod and apparatus for providing broker service to auctions
US20020087892 *Nov 29, 2001Jul 4, 2002Hideyo ImazuAuthentication method and device
US20030208684 *Mar 7, 2001Nov 6, 2003Camacho Luz MariaMethod and apparatus for reducing on-line fraud using personal digital identification
US20040030935 *Oct 30, 2001Feb 12, 2004Akinori KaiUser authentication method in network
US20050038715 *Sep 13, 2004Feb 17, 2005Ecardless Bancorp Ltd.Customer processing for purchasing on the internet using verified order information
US20050192893 *Nov 24, 2004Sep 1, 2005Keeling John E.Authenticated messaging-based transactions
US20050273420 *Jan 3, 2005Dec 8, 2005Lenin SubramanianMethod and system for customizable homepages for network-based auctions
US20060020559 *Jul 14, 2005Jan 26, 2006Scribocel, Inc.System for authentication and identification for computerized and networked systems
US20060143122 *May 9, 2003Jun 29, 2006Sines Randy DPurchasing on the internet using verified order information and bank payment assurance
US20060184428 *Jan 3, 2006Aug 17, 2006Ecardless Bancorp Ltd.Transferring funds in connection with internet orders using order variables from two sources and authentication
US20060195382 *Nov 4, 2003Aug 31, 2006Sung Do HMethod for providing auction service via the internet and a system thereof
US20070053518 *Jun 6, 2006Mar 8, 2007Peter TompkinsMethod and system for conducting financial and non-financial transactions using a wireless device
US20070136179 *Dec 14, 2005Jun 14, 2007Toolow, Inc., A Delaware CorporationSystem & method for providing reverse auction services
US20070174206 *Dec 27, 2006Jul 26, 2007Brian ColellaSystem for secure online selling, buying and bill pay in an electronic commerce setting
US20070220007 *Mar 13, 2007Sep 20, 2007International Business Machines CorporationMethod and system for electronic authentication
US20070234421 *Dec 22, 2003Oct 4, 2007Shinichi OginoAuthentication System, Authentication Server, Authenticating Method, Authenticating . . .
US20070243922 *Mar 3, 2007Oct 18, 2007Coupland Richard C IiiScheduled competition-based auction and elimination game
US20070300292 *Jun 21, 2006Dec 27, 2007Ebay Inc.Computer system authentication using security indicator
US20080010141 *Jun 26, 2006Jan 10, 2008Gnumber, Inc.System, method, and user interface for advertising via a voice channel
US20080065486 *Aug 28, 2007Mar 13, 2008Daevid VincentPersonalized audio controlled shopping information service for a mobile device
US20080184346 *Jul 20, 2007Jul 31, 2008Intertrust Technologies Corp.Secure Authentication Systems and Methods
US20080189212 *Dec 19, 2007Aug 7, 2008Michael KulakowskiElectronic secure authentication for exchange buyer assurance system (eSafeBay)
US20090006262 *Oct 20, 2007Jan 1, 2009Brown Kerry DFinancial transaction payment processor
US20090178127 *Nov 7, 2005Jul 9, 2009Sony CorporationAuthentication system, authentication server, authenticating method, authenticating program, terminal, authentication requesting method, authentication requesting program, and storage medium
US20100023412 *May 31, 2006Jan 28, 2010Yoshiko KitagawaElectronic Commerce Method and License Registration Check Server Used for the Same
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US8056120 *Jun 6, 2008Nov 8, 2011Ricoh Company, LimitedAuthentication apparatus, authentication method, and computer program product
WO2013100973A1 *Dec 28, 2011Jul 4, 2013Intel CorporationPersona manager for network communications
WO2014105506A1 *Dec 17, 2013Jul 3, 2014General Electric CompanySystems and methods for non-destructive testing user profiles
Classifications
U.S. Classification726/3
International ClassificationG06F21/00
Cooperative ClassificationY10S707/99948, Y10S707/9994, Y10S707/99931, Y10S707/99935, Y10S707/99943, G06F21/41, H04L67/306, G06F2221/2149, Y10S707/99933, Y10S707/99939, G06F21/6218
European ClassificationG06F21/41, G06F21/62B, H04L29/08N29U
Legal Events
DateCodeEventDescription
Mar 18, 2008ASAssignment
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BENNETT, RICHARD;REEL/FRAME:020668/0881
Owner name: AT&T LABS, INC., TEXAS
Owner name: AT&T LABS, INC.,TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BENNETT, RICHARD;US-ASSIGNMENT DATABASE UPDATED:20100304;REEL/FRAME:20668/881
Effective date: 20080213
Owner name: AT&T LABS, INC.,TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BENNETT, RICHARD;REEL/FRAME:020668/0881
Effective date: 20080213
Owner name: AT&T LABS, INC., TEXAS
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BENNETT, RICHARD;REEL/FRAME:020668/0881
Effective date: 20080213